CA2983458A1 - Systeme de securite electronique et procede utilisant des agents intelligents - Google Patents

Systeme de securite electronique et procede utilisant des agents intelligents

Info

Publication number
CA2983458A1
CA2983458A1 CA2983458A CA2983458A CA2983458A1 CA 2983458 A1 CA2983458 A1 CA 2983458A1 CA 2983458 A CA2983458 A CA 2983458A CA 2983458 A CA2983458 A CA 2983458A CA 2983458 A1 CA2983458 A1 CA 2983458A1
Authority
CA
Canada
Prior art keywords
target
network
scan
results
network scan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA2983458A
Other languages
English (en)
Inventor
Raymond CANFIELD
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2983458A1 publication Critical patent/CA2983458A1/fr
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Selon l'invention, un procédé de sécurité électronique utilisant des agents intelligents (IA) comprend les étapes suivantes : surveiller sur un réseau, par l'agent intelligent (IA), un programme logiciel s'exécutant sur un système ; recevoir, par l'IA, des résultats produits par le logiciel ; présenter, par l'IA, les résultats ; classer par catégories les résultats, par l'IA, pour un stockage efficace et une récupération ultérieure efficace ; sauvegarder, par l'IA, les résultats classés par catégories ; utiliser les résultats classés par catégories, par l'IA, pour déduire des nouvelles connaissances ; classer par catégories les nouvelles connaissances, par l'IA, pour un stockage efficace et une récupération ultérieure efficace ; sauvegarder, par l'IA, les nouvelles connaissances classées par catégories ; et utiliser un ou plusieurs des résultats classés par catégories et les nouvelles connaissances classées par catégories, par l'IA, pour configurer le logiciel.
CA2983458A 2015-07-16 2016-07-18 Systeme de securite electronique et procede utilisant des agents intelligents Pending CA2983458A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562193486P 2015-07-16 2015-07-16
US62/193,486 2015-07-16
PCT/US2016/042820 WO2017011833A1 (fr) 2015-07-16 2016-07-18 Système de sécurité électronique et procédé utilisant des agents intelligents

Publications (1)

Publication Number Publication Date
CA2983458A1 true CA2983458A1 (fr) 2017-01-19

Family

ID=57757695

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2983458A Pending CA2983458A1 (fr) 2015-07-16 2016-07-18 Systeme de securite electronique et procede utilisant des agents intelligents

Country Status (5)

Country Link
US (3) US20180146002A1 (fr)
EP (1) EP3281114A4 (fr)
CA (1) CA2983458A1 (fr)
HK (1) HK1244072A1 (fr)
WO (1) WO2017011833A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3366755B1 (fr) 2017-02-22 2023-11-29 Infineum International Limited Améliorations apportées et relatives à des compositions de lubrification
US10757137B1 (en) * 2018-09-26 2020-08-25 NortonLifeLock Inc. Thwarting an impersonation attack using online decoy text
CN110865774B (zh) * 2018-12-28 2023-08-08 安天科技集团股份有限公司 一种打印设备的信息安全检测方法及装置
JP7105370B2 (ja) 2019-03-28 2022-07-22 オリンパス株式会社 トラッキング装置、学習済モデル、内視鏡システム及びトラッキング方法
WO2020194663A1 (fr) * 2019-03-28 2020-10-01 オリンパス株式会社 Dispositif de suivi, modèle pré-retenu, système d'endoscope et procédé de suivi
US11263295B2 (en) * 2019-07-08 2022-03-01 Cloud Linux Software Inc. Systems and methods for intrusion detection and prevention using software patching and honeypots
US11477231B2 (en) * 2020-06-10 2022-10-18 Saudi Arabian Oil Company System and method for vulnerability remediation prioritization
US11783068B2 (en) * 2021-03-24 2023-10-10 Bank Of America Corporation System for dynamic exposure monitoring
US11824886B2 (en) 2021-04-29 2023-11-21 Google Llc Determining the exposure level of vulnerabilities

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6363411B1 (en) * 1998-08-05 2002-03-26 Mci Worldcom, Inc. Intelligent network
AU8567798A (en) * 1998-06-19 2000-01-05 Netsafe, Inc. Method and apparatus for providing connections over a network
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US6202062B1 (en) * 1999-02-26 2001-03-13 Ac Properties B.V. System, method and article of manufacture for creating a filtered information summary based on multiple profiles of each single user
US20030074301A1 (en) * 1999-11-01 2003-04-17 Neal Solomon System, method, and apparatus for an intelligent search agent to access data in a distributed network
US6981028B1 (en) * 2000-04-28 2005-12-27 Obongo, Inc. Method and system of implementing recorded data for automating internet interactions
US20020093527A1 (en) * 2000-06-16 2002-07-18 Sherlock Kieran G. User interface for a security policy system and method
US20030051026A1 (en) * 2001-01-19 2003-03-13 Carter Ernst B. Network surveillance and security system
US6918066B2 (en) * 2001-09-26 2005-07-12 International Business Machines Corporation Method and system for evaluating applications on different user agents
CA2410118C (fr) * 2001-10-26 2007-12-18 Research In Motion Limited Systeme et methode de surveillance des reglages de configuration pour dispositifs et services de communication mobile
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US20030135507A1 (en) * 2002-01-17 2003-07-17 International Business Machines Corporation System and method for managing and securing meta data using central repository
US7133368B2 (en) * 2002-02-01 2006-11-07 Microsoft Corporation Peer-to-peer method of quality of service (QoS) probing and analysis and infrastructure employing same
ATE270800T1 (de) * 2002-05-24 2004-07-15 Swisscom Mobile Ag Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften
US7969900B2 (en) * 2002-06-24 2011-06-28 Paradyne Corporation Determination of network performance characteristics
US9009084B2 (en) * 2002-10-21 2015-04-14 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US20040088403A1 (en) * 2002-11-01 2004-05-06 Vikas Aggarwal System configuration for use with a fault and performance monitoring system using distributed data gathering and storage
US9503470B2 (en) * 2002-12-24 2016-11-22 Fred Herz Patents, LLC Distributed agent based model for security monitoring and response
US20040193918A1 (en) * 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US7246156B2 (en) * 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
US20070050777A1 (en) * 2003-06-09 2007-03-01 Hutchinson Thomas W Duration of alerts and scanning of large data stores
US7099853B1 (en) * 2004-02-09 2006-08-29 Trend Micro Incorporated Configurable hierarchical content filtering system
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management
CN101495992A (zh) * 2006-01-24 2009-07-29 游戏解决方案国际有限公司 用于数据挖掘和所挖掘数据的交互式呈现的系统和方法
US8429746B2 (en) * 2006-05-22 2013-04-23 Neuraliq, Inc. Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
US7930256B2 (en) * 2006-05-23 2011-04-19 Charles River Analytics, Inc. Security system for and method of detecting and responding to cyber attacks on large network systems
SG141289A1 (en) * 2006-09-29 2008-04-28 Wireless Intellect Labs Pte Lt An event update management system
US7821955B2 (en) * 2006-12-28 2010-10-26 Motorola, Inc. Universal Plug-and-Play latency and delay compensation
US8302196B2 (en) * 2007-03-20 2012-10-30 Microsoft Corporation Combining assessment models and client targeting to identify network security vulnerabilities
US20090006399A1 (en) * 2007-06-29 2009-01-01 International Business Machines Corporation Compression method for relational tables based on combined column and row coding
US8281396B2 (en) * 2008-08-15 2012-10-02 Qualys, Inc. System and method for performing remote security assessment of firewalled computer
KR20120004162A (ko) * 2010-07-06 2012-01-12 삼성전자주식회사 데이터베이스 관리 방법 및 이를 이용한 데이터베이스 서버 시스템
US9246932B2 (en) * 2010-07-19 2016-01-26 Sitelock, Llc Selective website vulnerability and infection testing
RU2446459C1 (ru) * 2010-07-23 2012-03-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ проверки веб-ресурсов на наличие вредоносных компонент
WO2012109633A2 (fr) * 2011-02-11 2012-08-16 Achilles Guard, Inc. D/B/A Critical Watch Plateforme de gestion de contre-mesures de sécurité
US20130263226A1 (en) * 2012-01-22 2013-10-03 Frank W. Sudia False Banking, Credit Card, and Ecommerce System
US9578060B1 (en) * 2012-06-11 2017-02-21 Dell Software Inc. System and method for data loss prevention across heterogeneous communications platforms
KR101909141B1 (ko) * 2012-07-27 2018-10-17 엘지전자 주식회사 전자기기 및 전자기기의 제어방법
US20140108215A1 (en) * 2012-10-12 2014-04-17 Optionsxpress Holdings, Inc. System and methods for trading
US20140181975A1 (en) * 2012-11-06 2014-06-26 William Spernow Method to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point
US8925076B2 (en) * 2012-12-11 2014-12-30 Kaspersky Lab Zao Application-specific re-adjustment of computer security settings
US9208324B2 (en) * 2013-09-17 2015-12-08 iViZ Techno Solutions Private Limited System and method to perform secure web application testing based on a hybrid pipelined approach
CN105683988A (zh) * 2013-09-27 2016-06-15 迈克菲公司 管理软件补救
GB2520987B (en) * 2013-12-06 2016-06-01 Cyberlytic Ltd Using fuzzy logic to assign a risk level profile to a potential cyber threat
WO2015134008A1 (fr) * 2014-03-05 2015-09-11 Foreground Security Système de détection et d'atténuation automatisées de menace internet et procédés associés
US9386078B2 (en) * 2014-05-30 2016-07-05 Ca, Inc. Controlling application programming interface transactions based on content of earlier transactions
US10936616B2 (en) * 2014-06-09 2021-03-02 Oracle International Corporation Storage-side scanning on non-natively formatted data
US10878039B2 (en) * 2014-09-22 2020-12-29 International Business Machines Corporation Creating knowledge base of similar systems from plurality of systems
JP6186515B2 (ja) * 2014-09-30 2017-08-23 株式会社日立国際電気 Ip通信システム、ipアドレス設定装置、及びipアドレス設定方法
US10146635B1 (en) * 2015-06-30 2018-12-04 EMC IP Holding Company LLC Virtual machine backup

Also Published As

Publication number Publication date
US11962611B2 (en) 2024-04-16
EP3281114A1 (fr) 2018-02-14
EP3281114A4 (fr) 2018-03-14
US20240275811A1 (en) 2024-08-15
US20180146002A1 (en) 2018-05-24
WO2017011833A1 (fr) 2017-01-19
HK1244072A1 (zh) 2018-07-27
US20210281599A1 (en) 2021-09-09

Similar Documents

Publication Publication Date Title
US11962611B2 (en) Cyber security system and method using intelligent agents
US11171925B2 (en) Evaluating and modifying countermeasures based on aggregate transaction status
Siadati et al. Detecting structurally anomalous logins within enterprise networks
US10491630B2 (en) System and method for providing data-driven user authentication misuse detection
EP3369232B1 (fr) Détection de cybermenaces contre des applications nuagiques
EP3776307B1 (fr) Système distribué pour une protection adaptative contre des analyseurs de vulnérabilités ciblés sur un service web
US20210021636A1 (en) Automated Real-time Multi-dimensional Cybersecurity Threat Modeling
Tien et al. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
US10972461B2 (en) Device aware network communication management
RU2676021C1 (ru) Система и способ определения DDoS-атак
Kholidy Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
US10542044B2 (en) Authentication incident detection and management
JP2019506674A (ja) パターンマッチングベースのデータセット抽出
CN113660224B (zh) 基于网络漏洞扫描的态势感知防御方法、装置及系统
WO2022087510A1 (fr) Détection et vérification de comportement
JP2012527691A (ja) アプリケーションレベルセキュリティのためのシステムおよび方法
Cotroneo et al. Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
US11481478B2 (en) Anomalous user session detector
US20230095415A1 (en) Helper agent and system
JP2024536226A (ja) 機械学習を介して悪意のあるハンズオンキーボード活動を検出するためのシステムおよび方法
Yamada et al. RAT-based malicious activities detection on enterprise internal networks
KR101658450B1 (ko) 웹 애플리케이션 서버로부터 수집된 트랜잭션 정보 및 고유세션 id 통한 사용자 식별을 이용한 보안장치.
Chopra et al. SHAPE—an approach for self-healing and self-protection in complex distributed networks
KR102018348B1 (ko) 사용자 행동 분석 기반의 목표계정 탈취 감지 장치
KR102366846B1 (ko) 데이터유출 탐지 보안 시스템 및 방법

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618

EEER Examination request

Effective date: 20210618